QUESTION 238Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping?

A. Encrypt it with Joe’s private keyB. Encrypt it with Joe’s public keyC. Encrypt it with Ann’s private keyD. Encrypt it with Ann’s public key

Answer: D

QUESTION 239A director of IR is reviewing a report regarding several recent breaches. The director compiles the following statistic’s– Initial IR engagement time frame– Length of time before an executive management notice went out– Average IR phase completionThe director wants to use the data to shorten the response time. Which of the following would accomplish this?

QUESTION 240To reduce disk consumption, an organization’s legal department has recently approved a new policy setting the data retention period for sent email at six months. Which of the following is the BEST way to ensure this goal is met?

QUESTION 241A security administrator is configuring a new network segment, which contains devices that will be accessed by external users, such as web and FTP server. Which of the following represents the MOST secure way to configure the new network segment?

A. The segment should be placed on a separate VLAN, and the firewall rules should be configured to allow external traffic.B. The segment should be placed in the existing internal VLAN to allow internal traffic only.C. The segment should be placed on an intranet, and the firewall rules should be configured to allow external traffic.D. The segment should be placed on an extranet, and the firewall rules should be configured to allow both internal and external traffic.

Answer: A

QUESTION 242Which of the following types of attacks precedes the installation of a rootkit on a server?

A. PharmingB. DDoSC. Privilege escalationD. DoS

Answer: C

QUESTION 243Which of the following cryptographic algorithms is irreversible?

A. RC4B. SHA-256C. DESD. AES

Answer: B

QUESTION 244A security analyst receives an alert from a WAF with the following payload:var data= “<test test test>” ++ <../../../../../../etc/passwd>”Which of the following types of attacks is this?

QUESTION 245A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred?

A. The hacker used a race condition.B. The hacker used a pass-the-hash attack.C. The hacker-exploited importer key management.D. The hacker exploited weak switch configuration.

Answer: D

QUESTION 246Audit logs from a small company’s vulnerability scanning software show the following findings:Destinations scanned:-Server001- Internal human resources payroll server-Server101- Internet-facing web server-Server201- SQL server for Server101-Server301- Jumpbox used by systems administrators accessible from the internal networkValidated vulnerabilities found:-Server001- Vulnerable to buffer overflow exploit that may allow attackers to install software -Server101- Vulnerable to buffer overflow exploit that may allow attackers to install software -Server201- OS updates not fully current-Server301- Accessible from internal network without the use of jumpbox-Server301- Vulnerable to highly publicized exploit that can elevate user privilegesAssuming external attackers who are gaining unauthorized information are of the highest concern, which of the following servers should be addressed FIRST?

A. Server001B. Server101C. Server201D. Server301

Answer: B

QUESTION 247A security analyst wants to harden the company’s VoIP PBX. The analyst is worried that credentials may be intercepted and compromised when IP phones authenticate with the BPX. Which of the following would best prevent this from occurring?

A. Implement SRTP between the phones and the PBX.B. Place the phones and PBX in their own VLAN.C. Restrict the phone connections to the PBX.D. Require SIPS on connections to the PBX.

Answer: D

QUESTION 248An organization is comparing and contrasting migration from its standard desktop configuration to the newest version of the platform. Before this can happen, the Chief Information Security Officer (CISO) voices the need to evaluate the functionality of the newer desktop platform to ensure interoperability with existing software in use by the organization. In which of the following principles of architecture and design is the CISO engaging?

A. Dynamic analysisB. Change managementC. BaseliningD. Waterfalling

Answer: B

QUESTION 249A security administrator suspects a MITM attack aimed at impersonating the default gateway is underway. Which of the following tools should the administrator use to detect this attack? (Select two.)

QUESTION 228A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the authentication server before users provide credentials. The wireless network must also support authentication with usernames and passwords. Which of the following authentication protocols MUST the security engineer select?

A. EAP-FASTB. EAP-TLSC. PEAPD. EAP

Answer: C

QUESTION 229A system’s administrator has finished configuring firewall ACL to allow access to a new web answer.PERMIT TCP from: ANY to: 192.168.1.10:80PERMIT TCP from: ANY to: 192.168.1.10:443DENY TCP from: ANY to: ANYThe security administrator confirms form the following packet capture that there is network traffic from the internet to the web server:TCP 10.23.243.2:2000->192.168.1.10:80 POST/default’sTCP 172.16.4.100:1934->192.168.1.10:80 GET/session.aspx?user_1_sessionid= a12ad8741d8f7e7ac723847aa8231aThe company’s internal auditor issues a security finding and requests that immediate action be taken. With which of the following is the auditor MOST concerned?

QUESTION 231A company hired a third-party firm to conduct as assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that has a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists from the vendor. Which of the following BEST describes the reason why the vulnerability exists?

QUESTION 233A black hat hacker is enumerating a network and wants to remain convert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being convert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?

A. The vulnerability scanner is performing an authenticated scan.B. The vulnerability scanner is performing local file integrity checks.C. The vulnerability scanner is performing in network sniffer mode.D. The vulnerability scanner is performing banner grabbing.

Answer: C

QUESTION 234A development team has adopted a new approach to projects in which feedback is iterative and multiple iterations of deployments are provided within an application’s full life cycle. Which of the following software development methodologies is the development team using?

A. WaterfallB. AgileC. RapidD. Extreme

Answer: B

QUESTION 235A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?

QUESTION 236A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists form the vendor. Which of the following BEST describes the reason why the vulnerability exists?

QUESTION 237An organization uses SSO authentication for employee access to network resources. When an employee resigns, as per the organization’s security policy, the employee’s access to all network resources is terminated immediately. Two weeks later, the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server. Which of the following represents the BEST course of action?

A. Approve the former employee’s request, as a password reset would give the former employee access to only the human resources server.B. Deny the former employee’s request, since the password reset request came from an external email address.C. Deny the former employee’s request, as a password reset would give the employee access to all network resources.D. Approve the former employee’s request, as there would not be a security issue with the former employee gaining access to network.

QUESTION 205A new firewall has been places into service at an organization. However, a configuration has not been entered on the firewall. Employees on the network segment covered by the new firewall report they are unable to access the network. Which of the following steps should be completed to BEST resolve the issue?

A. The firewall should be configured to prevent user traffic form matching the implicit deny rule.B. The firewall should be configured with access lists to allow inbound and outbound traffic.C. The firewall should be configured with port security to allow traffic.D. The firewall should be configured to include an explicit deny rule.

Answer: A

QUESTION 206A security analyst is testing both Windows and Linux systems for unauthorized DNS zone transfers within a LAN on comptia.org from example.org. Which of the following commands should the security analyst use? (Select two.)

QUESTION 207Which of the following are the MAIN reasons why a systems administrator would install security patches in a staging environment before the patches are applied to the production server? (Select two.)

A. To prevent server availability issuesB. To verify the appropriate patch is being installedC. To generate a new baseline hash after patchingD. To allow users to test functionalityE. To ensure users are trained on new functionality

Answer: AD

QUESTION 208A Chief Information Officer (CIO) drafts an agreement between the organization and its employees. The agreement outlines ramifications for releasing information without consent and/for approvals. Which of the following BEST describes this type of agreement?

A. ISAB. NDAC. MOUD. SLA

Answer: B

QUESTION 209Which of the following would meet the requirements for multifactor authentication?

QUESTION 210A manager suspects that an IT employee with elevated database access may be knowingly modifying financial transactions for the benefit of a competitor. Which of the following practices should the manager implement to validate the concern?

QUESTION 211A penetration tester finds that a company’s login credentials for the email client were client being sent in clear text. Which of the following should be done to provide encrypted logins to the email server?

QUESTION 212Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transported. Which of the following BEST describes the attack vector used to infect the devices?

QUESTION 213A system administrator is reviewing the following information from a compromised server.

Given the above information, which of the following processes was MOST likely exploited via remote buffer overflow attack?

A. ApacheB. LSASSC. MySQLD. TFTP

Answer: D

QUESTION 214Joe, a security administrator, needs to extend the organization’s remote access functionality to be used by staff while travelling. Joe needs to maintain separate access control functionalities for internal, external, and VOIP services. Which of the following represents the BEST access technology for Joe to use?

A. RADIUSB. TACACS+C. DiameterD. Kerberos

Answer: B

QUESTION 215The availability of a system has been labeled as the highest priority. Which of the following should be focused on the MOST to ensure the objective?

QUESTION 205A new firewall has been places into service at an organization. However, a configuration has not been entered on the firewall. Employees on the network segment covered by the new firewall report they are unable to access the network. Which of the following steps should be completed to BEST resolve the issue?

A. The firewall should be configured to prevent user traffic form matching the implicit deny rule.B. The firewall should be configured with access lists to allow inbound and outbound traffic.C. The firewall should be configured with port security to allow traffic.D. The firewall should be configured to include an explicit deny rule.

Answer: A

QUESTION 206A security analyst is testing both Windows and Linux systems for unauthorized DNS zone transfers within a LAN on comptia.org from example.org. Which of the following commands should the security analyst use? (Select two.)

QUESTION 207Which of the following are the MAIN reasons why a systems administrator would install security patches in a staging environment before the patches are applied to the production server? (Select two.)

A. To prevent server availability issuesB. To verify the appropriate patch is being installedC. To generate a new baseline hash after patchingD. To allow users to test functionalityE. To ensure users are trained on new functionality

Answer: AD

QUESTION 208A Chief Information Officer (CIO) drafts an agreement between the organization and its employees. The agreement outlines ramifications for releasing information without consent and/for approvals. Which of the following BEST describes this type of agreement?

A. ISAB. NDAC. MOUD. SLA

Answer: B

QUESTION 209Which of the following would meet the requirements for multifactor authentication?

QUESTION 210A manager suspects that an IT employee with elevated database access may be knowingly modifying financial transactions for the benefit of a competitor. Which of the following practices should the manager implement to validate the concern?

QUESTION 211A penetration tester finds that a company’s login credentials for the email client were client being sent in clear text. Which of the following should be done to provide encrypted logins to the email server?

QUESTION 212Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transported. Which of the following BEST describes the attack vector used to infect the devices?

QUESTION 213A system administrator is reviewing the following information from a compromised server.

Given the above information, which of the following processes was MOST likely exploited via remote buffer overflow attack?

A. ApacheB. LSASSC. MySQLD. TFTP

Answer: D

QUESTION 214Joe, a security administrator, needs to extend the organization’s remote access functionality to be used by staff while travelling. Joe needs to maintain separate access control functionalities for internal, external, and VOIP services. Which of the following represents the BEST access technology for Joe to use?

A. RADIUSB. TACACS+C. DiameterD. Kerberos

Answer: B

QUESTION 215The availability of a system has been labeled as the highest priority. Which of the following should be focused on the MOST to ensure the objective?

QUESTION 194An organization’s file server has been virtualized to reduce costs. Which of the following types of backups would be MOST appropriate for the particular file server?

A. SnapshotB. FullC. IncrementalD. Differential

Answer: C

QUESTION 195A wireless network uses a RADIUS server that is connected to an authenticator, which in turn connects to a supplicant. Which of the following represents the authentication architecture in use?

QUESTION 196An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:

A. Something you have.B. Something you know.C. Something you do.D. Something you are.

Answer: A

QUESTION 197Adhering to a layered security approach, a controlled access facility employs security guards who verify the authorization of all personnel entering the facility. Which of the following terms BEST describes the security control being employed?

A. AdministrativeB. CorrectiveC. DeterrentD. Compensating

Answer: A

QUESTION 198A security analyst is hardening a web server, which should allow a secure certificate-based session using the organization’s PKI infrastructure. The web server should also utilize the latest security techniques and standards. Given this set of requirements, which of the following techniques should the analyst implement to BEST meet these requirements? (Select two.)

A. Install an X- 509-compliant certificate.B. Implement a CRL using an authorized CA.C. Enable and configure TLS on the server.D. Install a certificate signed by a public CA.E. Configure the web server to use a host header.

Answer: AC

QUESTION 199A manager wants to distribute a report to several other managers within the company. Some of them reside in remote locations that are not connected to the domain but have a local server. Because there is sensitive data within the report and the size of the report is beyond the limit of the email attachment size, emailing the report is not an option. Which of the following protocols should be implemented to distribute the report securely? (Select three.)

A. S/MIMEB. SSHC. SNMPv3D. FTPSE. SRTPF. HTTPSG. LDAPS

Answer: BDF

QUESTION 200An auditor is reviewing the following output from a password-cracking tool:User:1: Password1User2: Recovery!User3: Alaskan10User4: 4PrivateUser5: PerForMance2Which of the following methods did the author MOST likely use?

A. HybridB. DictionaryC. Brute forceD. Rainbow table

Answer: A

QUESTION 201Which of the following must be intact for evidence to be admissible in court?

QUESTION 203Which of the following cryptography algorithms will produce a fixed-length, irreversible output?

A. AESB. 3DESC. RSAD. MD5

Answer: D

QUESTION 204A technician suspects that a system has been compromised. The technician reviews the following log entry:WARNING- hash mismatch: C:\Window\SysWOW64\user32.dllWARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dllBased solely ono the above information, which of the following types of malware is MOST likely installed on the system?

QUESTION 183A system administrator wants to provide balance between the security of a wireless network and usability. The administrator is concerned with wireless encryption compatibility of older devices used by some employees. Which of the following would provide strong security and backward compatibility when accessing the wireless network?

A. Open wireless network and SSL VPNB. WPA using a preshared keyC. WPA2 using a RADIUS back-end for 802.1x authenticationD. WEP with a 40-bit key

Answer: C

QUESTION 184An information security specialist is reviewing the following output from a Linux server.

Based on the above information, which of the following types of malware was installed on the server? / local/

A. Logic bombB. TrojanC. BackdoorD. RansomwareE. Rootkit

Answer: C

QUESTION 185In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?

QUESTION 186A system administrator wants to provide for and enforce wireless access accountability during events where external speakers are invited to make presentations to a mixed audience of employees and non-employees. Which of the following should the administrator implement?

QUESTION 188A security analyst observes the following events in the logs of an employee workstation:

Given the information provided, which of the following MOST likely occurred on the workstation?

A. Application whitelisting controls blocked an exploit payload from executing.B. Antivirus software found and quarantined three malware files.C. Automatic updates were initiated but failed because they had not been approved.D. The SIEM log agent was not turned properly and reported a false positive.

Answer: A

QUESTION 189When identifying a company’s most valuable assets as part of a BIA, which of the following should be the FIRST priority?

A. LifeB. Intellectual propertyC. Sensitive dataD. Public reputation

Answer: A

QUESTION 190An organization needs to implement a large PKI. Network engineers are concerned that repeated transmission of the OCSP will impact network performance. Which of the following should the security analyst recommend is lieu of an OCSP?

A. CSRB. CRLC. CAD. OID

Answer: B

QUESTION 191When considering a third-party cloud service provider, which of the following criteria would be the BEST to include in the security assessment process? (Select two.)

A. Use of performance analyticsB. Adherence to regulatory complianceC. Data retention policiesD. Size of the corporationE. Breadth of applications support

Answer: BC

QUESTION 192Which of the following occurs when the security of a web application relies on JavaScript for input validation?

A. The integrity of the data is at risk.B. The security of the application relies on antivirus.C. A host-based firewall is required.D. The application is vulnerable to race conditions.

Answer: A

QUESTION 193An analyst is reviewing a simple program for potential security vulnerabilities before being deployed to a Windows server. Given the following code:

QUESTION 34Which of the following cryptographic attacks would salting of passwords render ineffective?

A. Brute forceB. DictionaryC. Rainbow tablesD. Birthday

Answer: B

QUESTION 35A network administrator wants to implement a method of securing internal routing.Which of the following should the administrator implement?

A. DMZB. NATC. VPND. PAT

Answer: C

QUESTION 36Which of the following types of keys is found in a key escrow?

A. PublicB. PrivateC. SharedD. Session

Answer: D

QUESTION 37A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?

A. BotnetB. RansomwareC. Polymorphic malwareD. Armored virus

Answer: A

QUESTION 38A company is currently using the following configuration:* IAS server with certificate-based EAP-PEAP and MSCHAP* Unencrypted authentication via PAPA security administrator needs to configure a new wireless setup with the following configurations:* PAP authentication method* PEAP and EAP provide two-factor authenticationWhich of the following forms of authentication are being used? (Select TWO).

A. PAPB. PEAPC. MSCHAPD. PEAP-MSCHAPE. EAPF. EAP-PEAP

Answer: AF

QUESTION 39A security administrator is trying to encrypt communication. For which of the following reasons should administrator take advantage of the Subject Alternative Name (SAM) attribute of a certificate?

A. It can protect multiple domainsB. It provides extended site validationC. It does not require a trusted certificate authorityD. It protects unlimited subdomains

Answer: B

QUESTION 40After a merger between two companies a security analyst has been asked to ensure that the organization’s systems are secured against infiltration by any former employees that were terminated during the transition.Which of the following actions are MOST appropriate to harden applications against infiltration by former employees? (Select TWO)

QUESTION 41A new mobile application is being developed in-house. Security reviews did not pick up any major flaws, however vulnerability scanning results show fundamental issues at the very end of the project cycle. Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?

QUESTION 42A security administrator is creating a subnet on one of the corporate firewall interfaces to use as a DMZ which is expected to accommodate at most 14 physical hosts. Which of the following subnets would BEST meet the requirements?

QUESTION 43A company has a security policy that specifies all endpoint computing devices should be assigned a unique identifier that can be tracked via an inventory management system. Recent changes to airline security regulations have cause many executives in the company to travel with mini tablet devices instead of laptops. These tablet devices are difficult to tag and track. An RDP application is used from the tablet to connect into the company network. Which of the following should be implemented in order to meet the security policy requirements?

QUESTION 44The security administrator receives an email on a non-company account from a coworker stating that some reports are not exporting correctly. Attached to the email was an example report file with several customers’ names and credit card numbers with the PIN. Which of the following is the BEST technical controls that will help mitigate this risk of disclosing sensitive data?

A. Configure the mail server to require TLS connections for every email to ensure all transport data is encryptedB. Create a user training program to identify the correct use of email and perform regular audits to ensure complianceC. Implement a DLP solution on the email gateway to scan email and remove sensitive data or filesD. Classify all data according to its sensitivity and inform the users of data that is prohibited to share